Opera users received malicious update
FYI...
Opera users received malicious update
- http://h-online.com/-1897805
27 June 2013 - "In a post on the browser vendor's security blog*, Opera employee Sigbjørn Vik has informed users of a security breach at the company during which unknown attackers have gotten control of an expired code signing certificate. The attackers used that certificate to sign malware and deliver it to thousands of Opera users through the browser's automatic updating function. Opera has advised users to update to a new version of its browser as soon as it is released. The attackers had accessed Opera's corporate network on 19 June between 1:00 am and 1:36 am CET. The company says that their systems have been cleaned and that there is no evidence of user data having been copied. Opera is working with relevant authorities to investigate the attack. Users who had received the malicious update might have installed it automatically and subsequently got infected by the included trojan. A scan with the VirusTotal service** reveals that more than half of the anti-virus engines used by the scanner can currently detect the trojan. Opera says it will soon release an updated version of their browser which will use a new code signing certificate "to be on the safe side"."
* http://my.opera.com/securitygroup/bl...ructure-attack
June 26, 2013
** https://www.virustotal.com/en/file/8...4b43/analysis/
___
Opera 12.16 released
- http://www.opera.com/docs/changelogs/unified/1216/
2013-07-04 - "Opera 12.16 is a recommended upgrade offering security and stability enhancements."
- http://www.opera.com/security/advisory/1048
July 4, 2013 - "Opera has released Opera Desktop 12.16 signed with a new certificate..."
> http://www.opera.com/browser/download/?custom=yes
> http://help.opera.com/Windows/12.10/en/autoupdate.html
:fear::fear: :mad: